{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:14:04Z","timestamp":1768518844361,"version":"3.49.0"},"reference-count":0,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2001,7,1]],"date-time":"2001-07-01T00:00:00Z","timestamp":993945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2001,7,1]]},"abstract":"<jats:p> The Yahalom protocol is one of those analyzed by Burrows et al. [5]. Based upon their analysis, they have proposed modifications to make the protocol easier to understand and to analyze. Both versions of Yahalom have now been analyzed using Isabelle\/HOL. Modified Yahalom satisfies strong security goals, and the original version is adequate. The mathematical reasoning behind these machine proofs is presented informally. An Appendix gives extracts from a formal proof. <\/jats:p><jats:p> Yahalom presents special difficulties because the compromise of one session key compromises other secrets. The proofs show that the resulting losses are limited. They rely on a new proof technique, which involves reasoning about the relationship between keys and the secrets encrypted by them. This technique is applicable to other difficult protocols, such as Kerberos IV [2]. <\/jats:p><jats:p> The new proofs do not rely on a belief logic. They use a fundamentally different formal model: the inductive method. They confirm the BAN analysis and the advantages of the proposed modifications. The new proof methods detect more flaws than BAN and analyze protocols in finer detail, while remaining broadly consistent with the BAN principles. In particular, the proofs confirm the explicitness principle of Abadi and Needham [1]. The proofs also suggest that any realistic model of security must admit that secrets can become compromised over time. <\/jats:p>","DOI":"10.3233\/jcs-2001-9302","type":"journal-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T07:26:21Z","timestamp":1463556381000},"page":"197-216","source":"Crossref","is-referenced-by-count":36,"title":["Relations between secrets: two formal analyses of the Yahalom protocol"],"prefix":"10.1177","volume":"9","author":[{"given":"Lawrence C.","family":"Paulson","sequence":"first","affiliation":[{"name":"Computer Laboratory, University of Cambridge, Pembroke Street, Cambridge CB2 3QG, UK."}]}],"member":"179","published-online":{"date-parts":[[2001,7,1]]},"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2001-9302","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2001-9302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T15:45:27Z","timestamp":1741621527000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-2001-9302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,7,1]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2001,7,1]]}},"alternative-id":["10.3233\/JCS-2001-9302"],"URL":"https:\/\/doi.org\/10.3233\/jcs-2001-9302","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2001,7,1]]}}}